Each subscription provides 4 months of access to over 75 Different Exercises.

Each exercise contains a Scenario, Objectives, and individual step by
step tasks to guide the user through all steps necessary to complete the
exercise.

Lab exercises are included for:

Footprinting and Reconnaissance

Scanning Networks

Enumeration

System Hacking

Trojans and Backdoors

Viruses and Worms

Sniffers

Social Engineering

Denial of Service

Session Hijacking

Hacking Webservers

Hacking Web Applications

SQL Injection

Hacking Wireless Networks

Evading IDS, Firewalls and Honeypots

Buffer Overflow

Cryptography

Price: £199

Each subscription provides 4 of months access to 15 Different Exercises.

Each exercise contains a Scenario, Objectives, and individual step by step tasks to guide the user through all steps necessary to complete the exercise. The Penetration Testing Exercises are designed to give the user the ultimate hands-on experience. Each exercise category above has its own Virtual Private Cloud that comes preconfigured with Vulnerable websites, Victim Machines, and the environment is LOADED with tools. Included in your network share are all the supporting tools required to practice in the Cyber Range / Lab

Lab exercises are included for:

TCPIP Packet Analysis

Information Gathering

Vulnerability Analysis

External Penetration Testing

Internal Network Penetration Testing

Firewall Penetration Testing

IDS Penetration Testing

Password Cracking Penetration Testing

Social Engineering Penetration Testing

Web Application Penetration Testing

SQL Penetration Testing

Price: £199

Each subscription provides 4 months of access to 68 Different Exercises. Each exercise contains a Scenario, Objectives, and individual step by step tasks to guide the user through all steps necessary to complete the exercise. The Secure Programming Exercises are designed to give the user the ultimate hands-on experience. Each exercise category above has its own Virtual Private Cloud that comes preconfigured with Vulnerable websites, Victim Machines, and the environment is LOADED with tools. Included in your network share are all the supporting tools required to practice in the Cyber Range / Lab